IT Management  >   Systems Operations  >   Security  >  

Zero Day Threats

RSS Feed    Add to Google    Add to My Yahoo!
Zero Day Threats White Papers (View All Report Types)
Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM
WHITE PAPER: Discover the cure to mobilephobia and how to holistically and securely manage the mobile enterprise in this exclusive white paper.
Posted: 02 Oct 2015 | Published: 01 Oct 2015


Shadow Data Exposed: Data Risk in the Cloud
sponsored by Elastica
WHITE PAPER: In this white paper, you'll learn how to understand the nature and magnitude of the risk associated with file sharing in the cloud.
Posted: 04 Sep 2015 | Published: 31 Dec 2014


Detect, prevent, and manage cyber-security incidents
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper suggests how you can partner with security services for more advanced and effective threat detection and mitigation.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Hewlett-Packard Company

2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download the report and learn what to expect and how you can protect your website from such attacks.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


An Unlikely Partnership? Application Security and Development
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the tension between development and security teams and proposes an approach to building security into the software development lifecycle.
Posted: 04 Sep 2015 | Published: 19 Aug 2015

Hewlett-Packard Company

Security Questions CEOs Should be Asking
sponsored by MASERGY
WHITE PAPER: This infographic highlights three of the most basic questions that CEOs should ask about their security.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Protecting against Application Logic and Session Theft Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses the danger of application logic attacks and gives a five-step process for proactively staying secure against them.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

Network-Wide Targeted Attack Detection
sponsored by Trend Micro
WHITE PAPER: This white paper explores holistic network security and how to detect and respond to targed attacks no matter where malware may be hiding
Posted: 01 Oct 2015 | Published: 26 Aug 2015

Trend Micro

The Cost of a Data Breach in 2015
sponsored by IBM
WHITE PAPER: This Ponemon report uses data from all over the UK to calculate how different organizational factors impact the cost of a data breach.
Posted: 03 Sep 2015 | Published: 31 May 2015


Achieve Business Continuity with Secure and Reliable Unified Communications
sponsored by ThinkingPhones
WHITE PAPER: This white paper provides 5 steps to educating yourself on the common pitfalls when investing in a unified communications platform. Access this paper now to get insight into achieving long-term security and stability with UC.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement